Multiple Access Techniques for 5G Wireless Networks and Beyond 2018
DOI: 10.1007/978-3-319-92090-0_17
|View full text |Cite
|
Sign up to set email alerts
|

Random Access Versus Multiple Access

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
6
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 54 publications
1
6
0
Order By: Relevance
“…Spreading-based multiple access is adopted for individual low-power consumption and to cope with low peak-to-average-power ratios, at the cost of increasing the users' transmission time. For these reasons and complying with previous works [26]- [28], users sign packets leveraging spreading codes with period much higher than the symbol interval 2 . c k,m (t) is the spreading waveform of user k for symbol m, which has an average per-symbol cross-correlation gain proportional to the inverse of the spreading factor N [14].…”
Section: System Modelsupporting
confidence: 53%
See 2 more Smart Citations
“…Spreading-based multiple access is adopted for individual low-power consumption and to cope with low peak-to-average-power ratios, at the cost of increasing the users' transmission time. For these reasons and complying with previous works [26]- [28], users sign packets leveraging spreading codes with period much higher than the symbol interval 2 . c k,m (t) is the spreading waveform of user k for symbol m, which has an average per-symbol cross-correlation gain proportional to the inverse of the spreading factor N [14].…”
Section: System Modelsupporting
confidence: 53%
“…When the number of users is sufficiently large over the coverage area and its ordered profile h of channel power gains is known, we can design an allocation function g(h) based on 1 The multipath components in a channel dominated by strong line-ofsight contribute to increasing the system noise level after symbol despreading as the receiver only processes the line-of-sight component for each user. 2 to have Gaussian distributed interference at the despreader's output.…”
Section: System Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…The asymptotic large-user assumption provides a very comfortable result in that N t (t) in ( 16), the denominator of Γ(t), turns out to be deterministic rather than the sum of random variables in (12). The relevant finding is that the SIC receiver can be seen as a dynamical system, whose behavior can be characterized through deterministic expressions either in differential or integral form.…”
Section: ) Concluding Remarksmentioning
confidence: 99%
“…The successful idea has been to enable nonorthogonal multiple access (NOMA) and adopt a multiuser receiver to resolve destructive packet collisions. This scheme enables the autonomous operation of multiple devices in exchange for increasing the complexity of the receiver, which must adopt an algorithm for detecting many users [11], [12]. Such is the case for the slotted [13] or the asynchronous [14] versions of the contention resolution diversity ALOHA protocol, which transmit many copies of the same packet and rely on an interference cancellation (IC) based demodulator.…”
Section: Introductionmentioning
confidence: 99%